Displaying 1 - 10 of 60 results

We don’t hear much about cyber breaches in Asia Pacific (APAC), but that doesn’t mean they aren’t happening every day. In fact, evidence reveals that APAC organizations often have difficulty identifying and responding to breaches. This latest M-Trends report focuses exclusively on APAC organizations and details the
...

Are you ready to handle a security breach? Russell Teague, Managing Director, Mandiant, will discuss what companies need to do to be breach-ready, and how being proactive in your incident preparedness is essential and could save you from devastating cost. Incident preparedness is more than
...

In this webinar, we’ll look at the security ecosystem and some of the reasons why technologies that react to threat activity may not be adequate in this golden age of cyber threats. We’ll also discuss a few of the most important skill sets necessary to cultivate and why personnel and
...

Given today’s sophisticated threat landscape - and how difficult it is to prevent, investigate, and remediate targeted attacks - advanced security solutions should be viewed as a strategic business investment, with a typical payback period between one and two years. Your executives need to know the challenges you face and
...

Learn in this data sheet how Mandiant’s Red Team Operations proactively identify and mitigate complex security vulnerabilities that can lead to critical data loss. Learn how to know whether your critical data is at risk and how easily it may be obtained by a malicious actor, and test your security
...

How strong is your cyber security? Join Chris Truncer, Senior Consultant at Mandiant, a FireEye company, as he provides an introduction to Mandiant Red Team Operations. Learn how Mandiant can achieve a realistic assessment of the effectiveness of your cyber security by emulating the attacker tools, tactics and practices used
...

M-Trends is the annual cyber security report created by Mandiant Services, a FireEye company. You are invited to a webinar, where Marshall Heilman, VP and Executive Director of Incident Response and Red Team Operations will take you through the 2016 report and provide insights from advanced attack investigations including trends,
...

Recent high-profile security breaches, underscore how destructive a breach can be to an organization's reputation and financial stability. Many of these headline-grabbing targeted attacks are based on monetary profit, political gain, or data theft, and are a result of an active, persistent pursuit with the
...

Keeping up with the volume of network alerts and the new techniques that cyber attackers are constantly developing can be exhausting for security teams. Organizations spend a considerable amount of time and money on cyber security, but the attacks keep coming—and many of them breach networks. Although
...